{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:39Z","timestamp":1742913339600,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662492826"},{"type":"electronic","value":"9783662492833"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49283-3_11","type":"book-chapter","created":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T20:06:37Z","timestamp":1452715597000},"page":"105-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection and Analysis of Water Army Groups on Virtual Community"],"prefix":"10.1007","author":[{"given":"Guirong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wandong","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Jiuming","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Huijie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Fengqin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,14]]},"reference":[{"key":"11_CR1","unstructured":"Internet Network Information Center of China: The 33rd statistical report on Internet development of China [EB\/OL]. \n                    http:\/\/www.eajcd.edu.cn\/pub\/wml.txt\/980810-2.html\n                    \n                  , 2014-03-05\/2014-05-06 (in Chinese)"},{"key":"11_CR2","unstructured":"Fielding, N., Cobain, I.: Revealed: US Spy Operation that Manipulates Social Media, Guardian, 17 March 2011. \n                    http:\/\/www.guardian.co.uk\/technology\/2011\/mar\/17\/us-spy-operation-social-networks"},{"key":"11_CR3","unstructured":"Chen, C., Wu, K., Srinivasan, V., et al.: Battling the internet water army: detection of hidden paid posters. In: International Conference on Advances in Social Networks Analysis and Mining, \n                    arXiv:1111.4297v1\n                    \n                   [cs.SI], 18 November 2011"},{"issue":"5","key":"11_CR4","first-page":"64","volume":"29","author":"C Fan","year":"2010","unstructured":"Fan, C., Xaio, X., Yu, L., et al.: Behavior analysis of network navy organization based on web forums. J. Shenyang Aerosp. Univ. 29(5), 64\u201367 (2010). (in Chinese)","journal-title":"J. Shenyang Aerosp. Univ."},{"issue":"8","key":"11_CR5","first-page":"77","volume":"54","author":"G Li","year":"2010","unstructured":"Li, G., Gan, T., Kou, G.: Recognition of net-cheaters based on text sentiment analysis. Libr. Inf. 54(8), 77\u201380 (2010). (in Chinese)","journal-title":"Libr. Inf."},{"issue":"7","key":"11_CR6","first-page":"1505","volume":"25","author":"M Qin","year":"2014","unstructured":"Qin, M., Ke, Y.: Overview of web spammer detection. J. Softw. 25(7), 1505\u20131526 (2014). (in Chinese)","journal-title":"J. Softw."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B., Lim, E.P.: Finding unusual review patterns using unexpected rules. In: Huang, J., Koudas, N., Jones, G. (eds.) Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 1549\u20131552. ACM Press, New York (2010)","DOI":"10.1145\/1871437.1871669"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Huang, J., Koudas, N., Jones, G., Wu, X., Collins-Thompson, K., An, A. (eds.) Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 939\u2013948. ACM Press, New York (2010)","DOI":"10.1145\/1871437.1871557"},{"issue":"4","key":"11_CR9","first-page":"61","volume":"3","author":"G Wang","year":"2012","unstructured":"Wang, G., Xie, S., Liu, B., Yu, P.S.: Identify online store review spammers via social review graph. ACM Trans. Intell. Syst. Technol. (TIST) 3(4), 61 (2012)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Mille, A., Gandon, F., Misselis, J., Rabinovich, M., Staab, S. (eds.) Proceedings of the 21st International Conference on World Wide Web (WWW 2012), pp.191\u2013200. ACM Press, New York (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"11_CR11","volume-title":"Web Data Mining","author":"BW Liu","year":"2013","unstructured":"Liu, B.W., Yu, Y.T.: Web Data Mining. Tsinghua University Publication, Beijing (2013). (in Chinese)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Husna, H., Phithakkitnukoon, S., Palla, S., Dantu, R.: Behavior analysis of spam botnets. In: Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE 2008), pp. 246\u2013253. IEEE Computer Society, Washington (2008)","DOI":"10.1109\/COMSWA.2008.4554418"},{"issue":"3","key":"11_CR13","first-page":"267","volume":"5","author":"R Brendel","year":"2008","unstructured":"Brendel, R., Krawczyk, H.: Application of social relation graphs for early detection of transient spammers. WSEAS Trans. Inf. Sci. Appl. 5(3), 267\u2013276 (2008)","journal-title":"WSEAS Trans. Inf. Sci. Appl."},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"48002","DOI":"10.1209\/0295-5075\/94\/48002","volume":"94","author":"Y-B Zhou","year":"2011","unstructured":"Zhou, Y.-B., Zhou, T.: A robust ranking algorithm to spamming. EPL (Europhys. Lett.) 94(4), 48002 (2011)","journal-title":"EPL (Europhys. Lett.)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhang, J., Chang, K., Long, C.: Uncovering collusive spammers in Chinese review websites. In: He, Q., Iyengar, A., Nejdl, W. (eds.) Proceedings of the 22nd ACM Conference on Information and Knowledge Management (CIKM 2013), pp. 979\u2013988. ACM Press, New York (2013)","DOI":"10.1145\/2505515.2505700"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Lu, Y., Zhang, L., Xiao, Y., Li, Y.: Simultaneously detecting fake reviews and review spammers using factor graph model. In: Davis, H.C., Halpin, H., Pentland, A. (eds.) Proceedings of the 5th Annual ACM Web Science Conference (WebSci 2013), pp. 225\u2013233. ACM Press, New York (2013)","DOI":"10.1145\/2464464.2464470"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Lin, C., Zhou, Y., Chen, K., He, J., Yang, X., Song, L.: Analysis and identification of spamming behaviors in Sina Weibo microblog. In: Zhu, F., He, Q., Yan, R. (eds.) Proceedings of the 7th Workshop on Social Network Mining and Analysis (SNAKDD 2013), pp. 5\u201313. ACM Press, New York (2013)","DOI":"10.1145\/2501025.2501035"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.knosys.2012.08.016","volume":"37","author":"Z Bu","year":"2013","unstructured":"Bu, Z., Xia, Z., Wang, J.: A sock puppet detection algorithm on virtual spaces. Knowledge Based Systems 37, 366\u2013377 (2013)","journal-title":"Knowledge Based Systems"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Zheng, X., Lai, Y.M., Chow, K.P., et al.: Sockpuppet detection in online discussion forums. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 374\u2013377 (2011)","DOI":"10.1109\/IIHMSP.2011.69"},{"issue":"3","key":"11_CR20","first-page":"700","volume":"38","author":"F Jiang","year":"2010","unstructured":"Jiang, F., Du, J., Sui, Y., Cao, C.: Outlier detection based on boundary and distance. Acta Electronica Sinica 38(3), 700\u2013705 (2010). (in Chinese)","journal-title":"Acta Electronica Sinica"},{"issue":"3","key":"11_CR21","first-page":"506","volume":"25","author":"Y Lin","year":"2014","unstructured":"Lin, Y., Wang, X., Zhou, A.: Survey on quality evaluation and control of online reviews. J. Softw. 25(3), 506\u2013527 (2014). (in Chinese)","journal-title":"J. Softw."},{"issue":"11","key":"11_CR22","first-page":"153","volume":"40","author":"G Chen","year":"2013","unstructured":"Chen, G., Cai, W., Xu, H., et al.: Empirical analysis on human behavior dynamics in online forum. J. Hunan Univ. 40(11), 153\u2013160 (2013). (in Chinese)","journal-title":"J. Hunan Univ."},{"issue":"1","key":"11_CR23","first-page":"157","volume":"44","author":"D Peng","year":"2011","unstructured":"Peng, D., Cai, W.: The web forum crawling technology and system implementation. Comput. Eng. Sci. 44(1), 157\u2013160 (2011)","journal-title":"Comput. Eng. Sci."},{"issue":"7039","key":"11_CR24","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1038\/nature03459","volume":"435","author":"AL Barab\u00e1si","year":"2005","unstructured":"Barab\u00e1si, A.L.: The origin of bursts and heavy tails in human dynamics [J]. Nature 435(7039), 207\u2013211 (2005)","journal-title":"Nature"}],"container-title":["Communications in Computer and Information Science","Computer Engineering and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49283-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T05:46:17Z","timestamp":1559367977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49283-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662492826","9783662492833"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49283-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"14 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}